Rahul Saha
Orcid: 0000-0003-3921-9512
According to our database1,
Rahul Saha
authored at least 65 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Clust. Comput., November, 2024
PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval.
Clust. Comput., September, 2024
Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities.
Clust. Comput., July, 2024
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things.
Clust. Comput., June, 2024
Internet Things, April, 2024
VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments.
Veh. Commun., 2024
IEEE Trans. Dependable Secur. Comput., 2024
AALMOND: Decentralized Adaptive Access Control of Multiparty Data Sharing in Industrial Networks.
IEEE Internet Things J., 2024
IEEE Access, 2024
IEEE Access, 2024
2023
BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT.
IEEE Internet Things J., September, 2023
Comput. Secur., September, 2023
Comput. Commun., September, 2023
IEEE Trans. Serv. Comput., 2023
Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit.
IEEE Trans. Serv. Comput., 2023
Improved aquila optimization-based parameter evaluation framework and meta-heuristic algorithm in radio-over-fiber SpatialMux multi-input multi-output long-term evolution system.
Int. J. Commun. Syst., 2023
Enhancement of Security in GFDM Using Ebola-Optimized Joint Secure Compressive Sensing Encryption and Symbol Scrambling Model.
Proceedings of the 3rd International Conference on Artificial Intelligence and Computer Vision, 2023
2022
DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2022
A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development.
Multim. Tools Appl., 2022
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions.
J. Netw. Comput. Appl., 2022
J. Netw. Comput. Appl., 2022
Internet of Things Framework for Oxygen Saturation Monitoring in COVID-19 Environment.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Machine and deep learning amalgamation for feature extraction in Industrial Internet-of-Things.
Comput. Electr. Eng., 2022
DeBot: A deep learning-based model for bot detection in industrial internet-of-things.
Comput. Electr. Eng., 2022
Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey.
IEEE Access, 2022
Proceedings of the Workshop on Artificial Intelligence (WAI 2022) Co-located with Computing Congress (CC 2022), Chennai, India,January 28, 2022
Proceedings of the IEEE International Symposium on Measurements & Networking, 2022
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022
Analog and Digital RoF Spatial Mux MIMO-LTE System based A2 (arithmetic Aquila) optimization model for 5G network.
Proceedings of the Algorithms, Computing and Mathematics Conference 2022 (ACM 2022), Hybrid Event, Chennai, India, August 29, 2022
2021
The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface.
IEEE Trans. Veh. Technol., 2021
Adaptive classifier-based intrusion detection system using logistic regression and Euclidean distance on network probe vectors in resource constrained networks.
Int. J. Inf. Comput. Secur., 2021
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications.
Future Gener. Comput. Syst., 2021
A secure localization scheme based on trust assessment for WSNs using blockchain technology.
Future Gener. Comput. Syst., 2021
LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments.
IEEE Access, 2021
A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges.
IEEE Access, 2021
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021
2020
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption.
IEEE Trans. Veh. Technol., 2020
IEEE Syst. J., 2020
J. Inf. Secur. Appl., 2020
A Novel Framework for Fog Computing: Lattice-Based Secured Framework for Cloud Interface.
IEEE Internet Things J., 2020
CoRR, 2020
A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect.
IEEE Access, 2020
CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure.
IEEE Access, 2020
2019
Improved Location Estimation in Wireless Sensor Networks Using a Vector-Based Swarm Optimized Connected Dominating Set.
Sensors, 2019
Sensors, 2019
Proof-of-Work Consensus Approach in Blockchain Technology for Cloud and Fog Computing Using Maximization-Factorization Statistics.
IEEE Internet Things J., 2019
IEEE Access, 2019
MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features.
IEEE Access, 2019
A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks.
IEEE Access, 2019
2018
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys.
Secur. Commun. Networks, 2018
Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN.
Int. J. Inf. Secur. Priv., 2018
An improved DV-Hop localization with minimum connected dominating set for mobile nodes in wireless sensor networks.
Int. J. Distributed Sens. Networks, 2018
Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication.
IEEE Access, 2018
2017
A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks.
Mob. Inf. Syst., 2017
Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in Wireless Sensor Networks.
J. Netw. Comput. Appl., 2017
2015
Probabilistic Relation between Triadic Closure and the Balance of Social Networks in Presence of Influence.
Int. J. Cyber Behav. Psychol. Learn., 2015
2011
CoRR, 2011